Tag: hacking
-
Hacktivists claim to have hacked Homeland Security to release ICE contract data
A hacking group called Department of Peace said they hacked a specific office within Homeland Security to protest ICE’s mass deportation campaign, and the companies aiding it. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/02/hacktivists-claim-to-have-hacked-homeland-security-to-release-ice-contract-data/
-
North Korea’s APT37 Expands Toolkit to Breach Air-Gapped Networks
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/north-korea-apt37-expands-toolkit/
-
Suspected Chinese Cyberespionage Operation Hits 53 Telecoms
Google Unmasks, Disrupts Group Using Sheets for Command-and-Control Purposes. Likely Chinese nation-state hackers used online spreadsheets as infrastructure for hacking campaigns that affected at least 53 telecom operators across 42 countries, Google disclosed Wednesday. Incident responders discovered a backdoor being remotely controlled through Google Sheets. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/suspected-chinese-cyberespionage-operation-hits-53-telecoms-a-30857
-
Scattered Lapsus$ Hunters seeks women for vishing attacks
The Scattered Lapsus$ Hunters (SLH) hacking collective has launched a recruitment push aimed specifically at women, offering cash payments for participating in voice-phishing … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/26/slh-seeks-women-for-vishing-attacks/
-
Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign
UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/google-prolific-china-hacking/
-
Inside the story of the US defense contractor who leaked hacking tools to Russia
The former boss of a U.S. hacking tools maker was jailed for selling highly sensitive software exploits to a Russian broker. This is how we first learned of his arrest, reported the story, and some of the unanswered questions we still have. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/25/inside-the-story-of-the-us-defense-contractor-who-leaked-hacking-tools-to-russia/
-
US sanctions Russian broker for buying stolen zero-day exploits
The U.S. Treasury Department has sanctioned a Russian exploit broker who bought stolen hacking tools from a former executive of a U.S. defense contractor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-sanctions-russian-exploit-broker-for-buying-stolen-zero-days/
-
Romanian Hacker Extradited to US Admits Hacking Oregon State Network
Catalin Dragomir admits to hacking an Oregon government office and selling network access. Read more on the $250k fraud case and his 2026 sentencing. First seen on hackread.com Jump to article: hackread.com/romanian-hacker-extradited-us-hacking-oregon-state/
-
North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East
Tags: attack, country, cybersecurity, hacker, hacking, healthcare, lazarus, middle-east, military, north-korea, ransomwareCybersecurity researchers said they saw Medusa attacks launched by members of Lazarus, a well-known North Korean hacking operation housed within the country’s military, against a company in the Middle East and a healthcare organization in the U.S. First seen on therecord.media Jump to article: therecord.media/north-korean-hackers-using-medusa-ransomware
-
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and individuals mainly located across the Middle East and North Africa (MENA) region as part of a new campaign codenamed Operation Olalampo.The activity, first observed on January 26, 2026, has resulted in the deployment of new malware…
-
Lessons From AI Hacking: Every Model, Every Layer Is Risky
After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/lessons-ai-hacking-model-every-layer-risky
-
Cellebrite cut off Serbia citing abuse of its phone unlocking tools. Why not others?
Cellebrite, which makes phone unlocking and hacking tools, stopped sales to countries that allegedly abused its tools. But after new allegations in Jordan and Kenya, the company has changed its approach. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/19/cellebrite-cut-off-serbia-citing-abuse-of-its-phone-unlocking-tools-why-not-others/
-
Nigerian man gets eight years in prison for hacking tax firms
Tags: hackingA Nigerian national was sentenced to eight years in prison for hacking multiple tax preparation firms in Massachusetts and filing fraudulent tax returns seeking over $8.1 million in refunds. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/nigerian-man-gets-eight-years-in-prison-for-hacking-tax-firms/
-
Nigerian man gets eight years in prison for hacking tax firms
Tags: hackingA Nigerian national was sentenced to eight years in prison for hacking multiple tax preparation firms in Massachusetts and filing fraudulent tax returns seeking over $8.1 million in refunds. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/nigerian-man-gets-eight-years-in-prison-for-hacking-tax-firms/
-
Texas sues TP-Link over Chinese hacking risks, user deception
Texas sued networking giant TP-Link Systems, accusing the company of deceptively marketing its routers as secure while allowing Chinese state-backed hackers to exploit firmware vulnerabilities and access users’ devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/texas-sues-tp-link-over-chinese-hacking-risks-user-deception/
-
Hacking conference Def Con bans three people linked to Epstein
The Def Con hacking conference banned hackers Pablos Holman and Vincenzo Iozzo, as well as former MIT Media Lab director Joichi Ito, from attending the annual conference after their reported connections with Jeffrey Epstein. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/18/hacking-conference-def-con-bans-three-people-linked-to-epstein/
-
Hackers Increasingly Prefer Fast and Low-Complexity Attacks
Incident Responders Detail Top Ransomware and Business Email Compromise Tactics. There’s no need to invest into sophisticated hacking operations when moving fast and exploiting well-trod techniques gives threat actors all the access they want. Threat actors are prioritizing low-complexity entry points, rather than investing in sophisticated exploits, say incident responders. First seen on govinfosecurity.com Jump…
-
Chinese hackers exploiting Dell zero-day flaw since mid-2024
A suspected Chinese state-backed hacking group has been quietly exploiting a critical Dell security flaw in zero-day attacks that started in mid-2024. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/
-
Newly identified hacking groups provide access to OT environments
A state-linked adversary has begun to pivot from the Ukraine war with new attacks targeting Europe and the U.S. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/new-hacking-groups-access-ot-environments/812323/
-
Citizen Lab links Cellebrite to the hacking of a Kenyan presidential candidate’s phone
The research lab says forensic evidence suggests the phone-cracking technology was used against Boniface Mwangi after his July arrest. First seen on cyberscoop.com Jump to article: cyberscoop.com/citizen-lab-kenya-cellebrite-phone-cracking-boniface-mwangi-forensic-evidence/
-
Citizen Lab links Cellebrite to the hacking of a Kenyan presidential candidate’s phone
The research lab says forensic evidence suggests the phone-cracking technology was used against Boniface Mwangi after his July arrest. First seen on cyberscoop.com Jump to article: cyberscoop.com/citizen-lab-kenya-cellebrite-phone-cracking-boniface-mwangi-forensic-evidence/
-
Texas AG Investigating Conduent, BCBS Texas in Hack
Will the Back-Office Services’ Firm Incident Shatter US Data Breach Records?. The Texas attorney general office has launched an investigation into the Conduent Business Services hacking incident, which affected about 15.5 million Texans, including about 4 million Blue Cross Blue Shield of Texas members. Will the nationwide victim tally shatter data breach records in the…
-
Fintech lending giant Figure confirms data breach
The company said hackers downloaded “a limited number of files” after breaking into an employee’s account. The hacking group ShinyHunters took responsibility for the breach. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/13/fintech-lending-giant-figure-confirms-data-breach/
-
US needs to impose ‘real costs’ on bad actors, State Department cyber official says
At the Munich Cyber Security Conference, senior U.S. officials signaled that a defensive cyber crouch is giving way to something closer to Cold Warstyle deterrence, an effort to convince adversaries that the costs of hacking the United States will outweigh the benefits. First seen on therecord.media Jump to article: therecord.media/usa-cyber-actors-consequences
-
Hacking Challenge 2026 – Diese Hacker sind die Zukunft der IT-Security
First seen on security-insider.de Jump to article: www.security-insider.de/sieger-hacking-challenge-2026-th-augsburg-a-a0de5c16059ee5ca2bda70fa3f9ae96f/
-
Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support
Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction…
-
Hacking Challenge 2026 – Die Hacker sind die Zukunft der IT-Security
First seen on security-insider.de Jump to article: www.security-insider.de/sieger-hacking-challenge-2026-th-augsburg-a-a0de5c16059ee5ca2bda70fa3f9ae96f/
-
DOJ says Trenchant boss sold exploits to Russian broker capable of accessing ‘millions of computers and devices’
The former boss of the L3Harris-owned hacking and surveillance tools maker Trenchant faces nine years in prison for selling several exploits to a Russian broker, which counts the Russian government among its customers. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/11/doj-says-trenchant-boss-sold-exploits-to-russian-broker-capable-of-accessing-millions-of-computers-and-devices/
-
Leaked technical documents show China rehearsing cyberattacks on neighbors’ critical infrastructure
Internal files describe a training platform as part of a large integrated system designed to allow attackers to practice hacking replicas of “the real network environments” of China’s “main operational opponents in the South China Sea and Indochina directions.” First seen on therecord.media Jump to article: therecord.media/leaked-china-documents-show-testing-cyber-neighbors
-
State-Backed Hackers Target Military Officials, Journalists via Signal
A suspected state-sponsored hacking group is actively targeting high-profile individuals across Europe. The Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI) have identified a coordinated espionage campaign aimed at military officials, diplomats, politicians, and investigative journalists.”‹ Instead, they are using >>social engineering<< to weaponize the legitimate…

